US9154621B2 - Network-based social telephony firewall - Google Patents

Network-based social telephony firewall Download PDF

Info

Publication number
US9154621B2
US9154621B2 US14/054,142 US201314054142A US9154621B2 US 9154621 B2 US9154621 B2 US 9154621B2 US 201314054142 A US201314054142 A US 201314054142A US 9154621 B2 US9154621 B2 US 9154621B2
Authority
US
United States
Prior art keywords
subscriber
call
caller
threshold
calls
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US14/054,142
Other versions
US20150103990A1 (en
Inventor
Brian Lee
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Intellectual Property I LP
Original Assignee
AT&T Intellectual Property I LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AT&T Intellectual Property I LP filed Critical AT&T Intellectual Property I LP
Priority to US14/054,142 priority Critical patent/US9154621B2/en
Assigned to AT&T INTELLECTUAL PROPERTY I, L.P. reassignment AT&T INTELLECTUAL PROPERTY I, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LEE, BRIAN
Publication of US20150103990A1 publication Critical patent/US20150103990A1/en
Priority to US14/875,209 priority patent/US9571642B2/en
Application granted granted Critical
Publication of US9154621B2 publication Critical patent/US9154621B2/en
Priority to US15/430,743 priority patent/US9942395B2/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/43Billing software details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/80Rating or billing plans; Tariff determination aspects
    • H04M15/8027Rating or billing plans; Tariff determination aspects based on network load situation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/80Rating or billing plans; Tariff determination aspects
    • H04M15/8083Rating or billing plans; Tariff determination aspects involving reduced rates or discounts, e.g. time-of-day reductions or volume discounts
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42042Notifying the called party of information on the calling party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier
    • H04M3/42068Making use of the calling party identifier where the identifier is used to access a profile
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42136Administration or customisation of services
    • H04M3/42153Administration or customisation of services by subscriber
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/10Aspects of automatic or semi-automatic exchanges related to the purpose or context of the telephonic communication
    • H04M2203/1058Shopping and product ordering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/20Aspects of automatic or semi-automatic exchanges related to features of supplementary services
    • H04M2203/2038Call context notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/01Details of billing arrangements
    • H04M2215/0184Details of billing arrangements involving reduced rates or discounts, e.g. time-of-day reductions, volume discounts, cell discounts, group billing, frequent calling destination(s) or user history list

Definitions

  • the present disclosure relates generally to communication networks and, more particularly, to detecting and preventing calls from unwanted callers using feedback from subscribers.
  • Unwanted or undesirable calls present a particular problem for many network subscribers as well as for the communication network infrastructure. For example, telemarketers, survey outfits, charities, political groups and others may continually place calls to large numbers of subscribers. Many times the callers are deemed to be pushy or aggressive by the recipients of such calls. In addition, many entities continue to place calls to the same subscriber despite having been asked to stop calling. In some cases, these unwanted calls result in usage charges to a subscriber, further adding to the subscriber's frustration. There are schemes in place to address these problems. For example, with respect to cellular networks, current Federal Communication Commission (FCC) regulations do not permit telemarketers to use auto dialers to place calls to mobile phones. However, many subscribers report that such calls are still being received.
  • FCC Federal Communication Commission
  • telemarketers also benefit from the increased deployment and availability of Voice over Internet Protocol (VoIP) equipment and services.
  • VoIP Voice over Internet Protocol
  • a telemarketer may use a VoIP based auto dialer to place large numbers of calls over the Internet.
  • the telemarketer may change locations and equipment often enough to effectively avoid meaningful detection and countermeasures.
  • Do-not-call registries/lists exist in many jurisdictions. However, subscribers often report that certain callers are ignoring the do-not-call list(s). In addition, certain callers are exempt from complying with do-not-call laws and regulations, e.g., political callers, charities and local businesses.
  • the present disclosure describes a method for processing a call. For example, the method receives the call from a device of a caller destined to a device of a subscriber of a communication network. The method connects the call to the device of the subscriber and then receives from the device of the subscriber an indication that the call is an undesirable call. The indication further includes a description of the call. The method then provides a reward to the subscriber when the indication further includes the description of the call.
  • the present disclosure describes a method for filtering a call.
  • the method receives the call from a device of a caller destined to a device of a subscriber of a communication network and retrieves a profile of the subscriber.
  • the profile specifies a threshold for filtering the call from the device of the caller.
  • the threshold is determined by the subscriber and comprises a level of tagging, by other subscribers of the communication network, associated with a source identifier of the device of the caller being identified as a source of an undesirable call.
  • the method determines the source identifier of the device of the subscriber satisfies the threshold. When the threshold is satisfied, the method filters the call according to the profile of the subscriber.
  • the present disclosure describes a further method for processing a call.
  • the method receives the call from a device of a caller via a communication network.
  • the method obtains from the subscriber an indication that the call is an undesirable call.
  • the indication further includes a description of the call.
  • the method then transmits to the communication network the indication that includes the description of the call and receives from the communication network a notification of a reward to the subscriber in response to the transmitting to the communication network the indication that includes the description of the call.
  • FIG. 1 illustrates an exemplary network related to the present disclosure
  • FIG. 2 illustrates a flowchart of a method for processing a call, according to the present disclosure
  • FIG. 3 illustrates a flowchart of a method for filtering a call, according to the present disclosure
  • FIG. 4 illustrates a flowchart of a further method for processing a call, according to the present disclosure.
  • FIG. 5 illustrates a high-level block diagram of a general-purpose computer suitable for use in performing the functions, methods and algorithms described herein.
  • the present disclosure describes social telephony firewall devices, methods and computer-readable media that leverage a subscriber base of a communications network and/or contacts of a subscriber to identify sources of undesirable calls and to filter calls from these sources for alternative call handling. For example, after a call, a subscriber may be prompted by his or her endpoint device or by the network to engage a tagging service for tagging the call as an undesirable call. In one embodiment, the subscriber may then be additionally prompted to further categorize the call. For example, the subscriber may provide a description of the call, e.g., the type of call, the purpose of the call and/or characteristics of the caller.
  • a description of the type of call may comprise: an automated call, a sales call, a fundraiser call, a political call, a telemarketer call, a survey call, etc.
  • a description of the purpose of the call may relate to the subject of the call, e.g., a particular product or service (e.g., insurance sales, timeshare sales, car sales, telecommunications service sales and the like), political advocating, political fundraising, a survey about television programming, a survey about public transportation services, etc.
  • Characteristics of the caller may describe the attitude or manner of the caller, e.g., whether the caller was aggressive, impolite, rude and so forth.
  • a description of a characteristic of the caller may further include a scale for the subscriber to rank the characteristic of the caller (e.g., 1 to 10, where 1 is not at all abusive and 10 is most abusive, etc.).
  • the user may select from choices using a touchpad, or be engaged through an interactive voice response (IVR) system either on the subscriber's endpoint device or hosted in the network.
  • IVR interactive voice response
  • the subscriber may also be prompted to provide more detailed information regarding the call.
  • a call as a sales call e.g., a type of call
  • the subscriber may be prompted to provide further indication that the call related to a car sales offer, a restaurant discount offer, an insurance offer, etc. (e.g., a purpose of the call).
  • the caller may then be filtered, e.g., blocked, warned, throttled, etc.
  • subsequent calls from the caller to a subscriber may be given a different call handling, e.g., sending the call automatically to a subscriber's voicemail with an introductory recording that indicates the call was flagged as being from an undesirable caller.
  • the subscribers may tag calls, which are then aggregated by source identifiers of the devices of the callers.
  • the device of the caller may be identified across different calls based upon one or more different source identifiers, including: a telephone number, a mobile equipment identifier (MEID), an International Mobile Equipment Identity (IMEI) number, an Internet Protocol (IP) address, a Session Initiation Protocol (SIP) address or other device identifier.
  • a telephone number a mobile equipment identifier (MEID)
  • IMEI International Mobile Equipment Identity
  • IP Internet Protocol
  • SIP Session Initiation Protocol
  • the subscriber receiving the call may not actually be aware of one or more of the source identifiers of the device of the caller. For instance, the subscriber typically would not know the IMEI number of the caller's device.
  • the caller may have caller identification (ID) blocking activated.
  • ID caller identification
  • these source identifiers are typically more readily available to the network provider.
  • the subscriber may simply tag a call. From the perspective of the network, the same tag may relate to both the call as well as the calling device (e.g., as determined by the source identifier) or the caller.
  • the network will aggregate subscriber's tags of incoming calls by source identifiers of the devices of callers.
  • the present disclosure may interchangeably refer to tagging a call, tagging a device of a caller, tagging a caller, or tagging a source identifier of a caller.
  • the threshold for filtering a caller is based not upon exceeding a raw number of tags, but is based upon a rate at which calls from the caller are tagged, e.g., 100 tags per week, etc.
  • the network may maintain counts, or scores regarding a level of tagging for any calling device that has been tagged at least once as being a source of an undesirable call.
  • the method may also store other information in connection with calling devices, including counts of the number of subscribers who have indicated that the caller is of a particular category, average scores of the caller on various characteristics scales, e.g., an average ranking of 9 out of 10 on an abusiveness scale as ranked by subscribers who have given feedback regarding the caller, and so forth.
  • the network sets default settings for subscribers of the social telephony firewall service. For instance, the network may set a threshold to block calls from callers that have been tagged 100 times or more. Each subscriber may then modify the default settings, e.g., a subscriber can request that calls be blocked from all callers that have been tagged only 50 times. In another example, a subscriber may set his/her personal preferences such that all calls from callers that have exceeded a particular tagging threshold for a particular category (e.g., insurance sales) should be blocked. On the other hand, another subscriber may allow such callers if the subscriber does not object to such callers even when such callers have exceeded the tagging threshold.
  • a threshold to block calls from callers that have been tagged 100 times or more.
  • Each subscriber may then modify the default settings, e.g., a subscriber can request that calls be blocked from all callers that have been tagged only 50 times.
  • a subscriber may set his/her personal preferences such that all calls from callers that have
  • the subscriber may currently be shopping for insurance and may temporarily welcome receiving insurance sales calls.
  • a different subscriber may desire to allow all sales calls except for calls from callers who have been tagged as abusive more than a threshold number of times.
  • Subscribers may also vary their configurations depending upon the time of day, e.g., using a lower threshold for blocking callers during business hours and using a higher threshold for other times, e.g., after 5:00 pm.
  • the network may provide rewards to a subscriber based upon the number of tags of undesirable calls provided by the subscriber. For example, a subscriber may tag a call as an undesirable call.
  • the subscriber may further provide a description of the call that indicates the type of call, the purpose of the call and/or characteristics of the caller. For instance, the subscriber may indicate that the call is a sales call, that the caller ranked as 7 out of 10 in terms of rudeness, and so forth. For instance, the subscriber may choose between a number of predefined choices provided by the network for categorizing the call.
  • the subscriber may be given a reward, or a greater reward as compared to if the subscriber simply tagged the call as an undesirable call and did not provide the additional description(s) regarding the call.
  • the network may provide credits to the subscriber's account, subsidize the social telephony firewall service to a greater degree for the subscriber, offer redeemable rewards points, and so forth.
  • the tags of subscribers with a greater level of participation and who provide greater level of detail may be afforded greater weight in calculating a level of tagging of a caller. For instance, if a subscriber consistently provides extra information (i.e., more detailed descriptions) regarding tagged calls/callers, the subscriber's tags may be given greater weight in calculating a tagging score of the caller. Such subscribers may be deemed to be “valued” tagging subscribers or “trusted” tagging subscribers. For example, a default threshold for a caller being tagged as a source of undesirable calls may be “100”.
  • the subscriber's tag may count twice or 1.5 times towards meeting this threshold, whereas a tag from a subscriber who only tags calls without provide further description and further details may have his or her tag be counted at face value, e.g., 1, or even at a discounted weight e.g., 0.75.
  • Thresholds for determining when a subscriber is considered to be a “valued tagging subscriber” may be set by the network.
  • the relative weighting to apply to the tagging of different categories of subscriber may also be set by the network.
  • FIG. 1 illustrates a block diagram of an exemplary communication system 100 , constructed in accordance with one or more aspects of the disclosure.
  • the present disclosure may be embodied as a network-based server hosting and/or executing a social telephony firewall service to process incoming calls, e.g., call setup/signaling messages, to perform filtering of the incoming calls prior to forwarding to subscriber devices, and to aggregate and store tagging information provided by various subscribers regarding sources of undesirable calls, and to perform other functions described above.
  • the present disclosure may comprise a software tool that is deployed on an application server, a call control element, a border element or other network-based device or server.
  • IP/MPLS Internet Protocol/Multi-Protocol Label Switching
  • IP/MPLS Internet Protocol/Multi-Protocol Label Switching
  • the present disclosure can be applied to communication networks in general, e.g., cellular networks, Internet Protocol (IP) Multimedia Subsystem (IMS) networks, asynchronous transfer mode (ATM) networks, and the like, or any other network suitable for voice telephony.
  • IP Internet Protocol
  • IMS Internet Multimedia Subsystem
  • ATM asynchronous transfer mode
  • endpoint devices 102 - 107 are configured for communication with the network 110 (e.g., an IP/MPLS core backbone network, supported by a service provider) via access networks 101 and 108 .
  • the endpoint devices 102 - 107 may comprise wired and wireless phones, cellular phones, terminal adapters, personal computers, laptop computers, personal digital assistants (PDAs), servers, and the like.
  • any one or more of endpoint devices 102 - 107 may comprise a subscriber device (e.g., a device of a subscriber of network 110 ) or may comprise a device of a user whose communications will be carried via the network 110 (e.g., a non-subscriber).
  • the access networks 101 and 108 serve as a conduit to establish a connection between the endpoint devices 102 - 107 and the border elements (BEs) 109 and 111 of the core network 110 .
  • the access networks 101 , 108 may each comprise a digital subscriber line (DSL) network, a broadband cable access network, a local area network (LAN), a wireless access network (WAN), a cellular/mobile network, a wireless fidelity (Wi-Fi) network, the Internet, and the like.
  • DSL digital subscriber line
  • LAN local area network
  • WAN wireless access network
  • Wi-Fi wireless fidelity
  • BEs 109 and 111 are network elements which reside at the edge of the core infrastructure and interface with endpoint devices for signaling and routing purposes over various types of access networks.
  • a BE is typically configured to serve as an edge router, a media gateway, a firewall, and the like.
  • Network 110 may also include a call control element (CCE) 114 , a media server (MS) 118 and other network elements, e.g., NE 119 , which may comprise a voicemail server, a honeypot, a tarpit, or other network component.
  • the CCE 114 is typically implemented as a media gateway controller or a softswitch and performs network wide call control related functions as well as interacts with the appropriate service related servers, when necessary.
  • the CCE 114 functions as a session initiation protocol (SIP) back-to-back user agent and is a signaling endpoint for all call legs between all BEs and the CCE 114 .
  • Media server 118 typically handles and terminates media streams, and provides services such as announcements, bridges, transcoding, and Interactive Voice Response (IVR) messages.
  • SIP session initiation protocol
  • IVR Interactive Voice Response
  • Network 110 may also comprise an application server (AS) 112 that contains a database 115 .
  • the application server 112 may comprise any server or computer that is well known in the art, and the database 115 may be any type of electronic collection of data that is well known in the art.
  • AS 112 and DB 115 may be implemented as a computing device such as illustrated in FIG. 5 and described below.
  • AS 112 may store and retrieve subscriber profiles from DB 115 , e.g., preferences and filtering rules regarding handling of undesirable calls in accordance with the present disclosure.
  • AS 112 /DB 115 may also collect, gather and store information on the tagging of callers and/or the devices of such callers as sources of undesirable calls.
  • AS 112 /DB 115 may provide various aspects of a social telephony firewall service in accordance with the present disclosure.
  • the call control element (CCE) 114 may receive the signaling message to setup the call. For example, if a call is originated by the endpoint device 105 towards the endpoint device 102 , the CCE 114 may receive a setup message, e.g., SIP signaling message, for setting up the call. Typically, the CCE 114 determines the routing logic for the destination address and forwards the signaling message towards the appropriate signaling gateway router serving the called party destination (in this case BE 109 ), as part of the normal process of establishing a call via network 110 .
  • the endpoint device 102 e.g., a subscriber device
  • the CCE 114 may receive the signaling message to setup the call. For example, if a call is originated by the endpoint device 105 towards the endpoint device 102 , the CCE 114 may receive a setup message, e.g., SIP signaling message, for setting up the call.
  • the CCE 114 determines the routing logic for the destination address and forwards the signaling
  • the CCE 114 may communicate with AS 112 to determine the routing logic for handling the call. For instance, AS 112 may retrieve information stored in DB 115 regarding the subscriber preferences of the subscriber associated with the called endpoint device 102 . AS 112 may also retrieve information stored in DB 115 regarding tagging of the calling endpoint device, e.g., based upon information in the call setup signaling message from CCE 114 . For example, AS 112 may look up the calling endpoint device 105 , in the database and retrieve information regarding a level of tagging of the calling endpoint device/caller as a source of undesirable calls.
  • the calling endpoint device may be referenced by any of the above described source identifiers such as a telephone number, IMEI number, etc. If a record exists for the caller/calling endpoint device, AS 112 may then apply the call the filtering rule(s) contained in the subscriber profile of the subscriber of endpoint device 102 .
  • AS 112 may indicate to the CCE 114 that the call setup signaling message should be forwarded to BE 109 for normal call processing.
  • the AS 112 may provide call routing logic for the CCE to filter the call and/or to perform alternative call handling, as directed by the filtering rule of the subscriber.
  • the CCE 114 may be provided with routing logic to drop or block the call, to provide a message back to the endpoint device 105 indicating that the call has been blocked, to forward the call to a voicemail server, e.g., NE 119 , for the caller to leave a message for the subscriber of endpoint device 102 , and so forth.
  • a voicemail server e.g., NE 119
  • the application server 112 may also receive tag information from subscriber devices (e.g., any one or more of endpoint devices 102 - 107 ) via the border elements 109 and 111 .
  • the border elements 109 and 111 may periodically upload aggregate tagging information to the application server 112 and/or the database 115 .
  • a subscriber may tag the call as an undesirable call, and may provide a further description regarding the call, e.g., a type of call, a purpose of the call and/or characteristics of the caller. The subscriber may provide such information on his or her own initiative, or may be prompted by the subscriber's device and/or by a network element of network 110 .
  • the caller may press a predefined series of keys (e.g., *99) at the end of the call to indicate that the caller is tagging the call as an undesirable call.
  • the caller may then have the opportunity to provide the further information regarding the call/caller.
  • BE 109 may recognize the predefined tone sequence as a request to tag the call.
  • the BE 109 may signal to CCE 114 that a session should be established between endpoint device 102 and AS 112 to allow the subscriber to provide a further description of the call.
  • the session may include MS 118 , e.g., to engage the subscriber in an IVR dialog to solicit further information from the subscriber.
  • the responses of the subscribers may then be stored in DB 115 .
  • the AS 112 may aggregate the tag with any other previous tags regarding the same calling endpoint device/caller. Any new or updated information regarding the caller/calling endpoint device may then be used by AS 112 in conjunction with subscribers' profiles/filtering rules to determine how to handle future calls from the calling endpoint device to any other subscribers of network 110 .
  • subscribers may interact with AS 112 to update, modify or change their preferences, e.g., filter rules contained in subscriber profiles regarding the preferred handling of undesirable calls. For example, subscribers may access AS 112 over a web interface, via a personal computer, using a dial-in IVR system or other automated response system (e.g., implemented by MS 118 ), and so forth.
  • IP network is described only to provide an illustrative environment in which voice, data and video packets can be transmitted on communication networks and in which various embodiments of the present disclosure may be employed.
  • NEs network elements
  • the system 100 may be expanded by including additional endpoint devices, access networks, and network elements without altering the present disclosure.
  • network elements are shown as discrete components, those skilled in the art will realize that one or more of such components may be consolidated into a lesser number of network elements and that functions described in connection with a particular network element may in fact be assigned to a different network element.
  • the CCE 114 and AS 112 may, in one example, comprise a single device.
  • the functions of AS 112 and DB 115 may be implemented in BE 109 and/or BE 111 instead.
  • the social telephony firewall service of the present disclosure may be implemented in a border element, e.g., in a signaling and/or media gateway, instead of in the AS 112 , as illustrated.
  • a border element e.g., in a signaling and/or media gateway
  • FIG. 2 illustrates a flowchart of a method 200 for processing a call.
  • the method 200 can be deployed in and/or performed by the application server for providing a social telephony firewall service.
  • the method 200 may be performed by one or more other devices, such as any one or more of the devices shown in system 100 of FIG. 1 .
  • the method 200 is performed by a general purpose computing device having a processor, a memory and input/output devices as illustrated below in FIG. 5 , specifically programmed to perform the steps, functions and/or operations of the method.
  • Method 200 starts in step 205 and proceeds to step 210 .
  • step 210 method 200 receives a call from a device of a caller destined to a device of a subscriber via a communication network.
  • the method 200 may receive a call setup signaling message for the device of the subscriber forwarded from an access network to the communication network.
  • the method 200 connects the call to the device of the subscriber.
  • the method may consult a social telephony firewall service profile of the subscriber. If the device of the caller does not fall within any filtering rules of the subscriber, the method 200 may simply allow normal call signaling and setup to proceed to allow the call to be established between the device of the caller and the device of the subscriber.
  • the method 200 receives an indication that the call is an undesirable call.
  • the subscriber may dial a predetermined sequence e.g., “*99”, in order to signal to the method 200 that the subscriber is tagging the call as an undesirable call.
  • the subscriber may signal a desire to tag the call using a voice command.
  • the method 200 may recognize a voice command uttered by the subscriber as signaling a desire to tag the call.
  • the method may also prompt the subscriber to provide a description of the call. For example, the method may prompt the subscriber to indicate a type of the call, a purpose of the call, a characteristic of the caller, scores/ratings of the caller with respect to one or more characteristics, and so forth. In response, the subscriber may then volunteer further information regarding the call. However, in another example, the subscriber may simply volunteer such information along with an indication that the call is an undesirable call, which is received by the method at step 230 .
  • the method 200 provides a notification of a reward to the subscriber when the indication received at step 230 includes a description of the call. For example, if the subscriber provides additional information beyond simply tagging the call as an undesirable call, the subscriber may be provided a reward such as a service credit with the communication network for a service provided by the communication network, e.g., conferencing service, a data plan service, or redeemable rewards points that can be used for purchasing items with a partner retailer and so forth.
  • the notification may comprises an automated voice call, a voice message, an email message, a text message, and so forth, depending upon the capabilities of the communication network and/or the preferences of the subscriber for receiving such notification.
  • the method 200 selects a level of reward to provide to the subscriber based upon the level of detail regarding the tagged call provided by the subscriber at step 230 . In other words, the more information provided by the subscriber, the greater the reward will be selected for the subscriber and indicated in the notification that is sent at step 240 .
  • step 240 the method 200 proceeds to step 295 where the method ends.
  • FIG. 3 illustrates a flowchart of a method 300 for filtering a call.
  • the method 300 can be deployed in and/or performed by an application server for providing a social telephony firewall service.
  • the method 300 may be performed by any one or more of the other devices shown in system 100 of FIG. 1 , e.g., a call control element, a border element, and so forth.
  • the method 300 is performed by a general purpose computing device having a processor, a memory and input/output devices as illustrated below in FIG. 5 , specifically programmed to perform the steps, functions and/or operations of the method.
  • Method 300 starts in step 305 and proceeds to step 310 .
  • step 310 method 300 receives a call from a device of a caller destined to a device of a subscriber via a communication network.
  • the method 300 may receive a call setup signaling message for the device of the subscriber forwarded from an access network to the communication network.
  • method 300 retrieves a subscriber profile associated with the subscriber and/or the device of the subscriber.
  • the device of the subscriber may be identified based upon call destination/recipient information in the call setup signaling message.
  • the profile may include filtering rules determined by the subscriber which set one or more thresholds with respect to a level of tagging of callers that dictates when a call from a device of caller should be filtered for alternative call handling.
  • one filtering rule may specify that calls be blocked from all callers who have been tagged more than a threshold, e.g., 50 times.
  • the subscriber may also configure the profile to vary various thresholds and preferences depending upon the time of day, certain categories of callers, and so forth.
  • tags of contacts e.g., friends and family
  • the calling device does satisfy the threshold of 100 and the call is subject to blocking or other alternative call handling as specified in the subscriber profile.
  • greater weight may be afforded to tags from other “valued” tagging subscribers in the social telephony firewall service.
  • the weightings may be applied by default or may be specified by the subscriber as part of his/her individual profile.
  • the method 300 may determine which subscribers are contacts using any presently available techniques. For instance, the method may simply look at a contact list of the subscriber stored on the device of the subscriber or in a subscriber profile stored within the communication network.
  • the method may have access to social network profile information regarding the subscriber and his or her contacts via the social network. For example, the method may access such information via a social network gateway (SNG) between the communication network and the social network.
  • SNG social network gateway
  • step 330 the method 300 determines whether the device of the caller has exceeded a threshold level of tagging by other subscribers of the communication network.
  • step 330 includes comparing the stored information regarding the device of the caller against one or more of the filtering rules in the subscriber profile of the called subscriber retrieved at step 320 to determine whether the device of the caller exceeds a threshold level of tagging. For instance, as described above a count of a number of tags of a particular device of a caller may be maintained.
  • step 330 may comprise the application of different thresholds to different types of aggregate information available regarding the device of the caller, e.g., type of call information, purpose of call information, and caller characteristics information.
  • step 330 the method 300 applies weightings to various tags prior to determining whether the calling device satisfies a threshold of one or more filtering rules contained in the subscriber profile. For instance, step 330 may involve applying weights to one or more of the tags depending upon which subscriber provided the tag, e.g., a subscriber with a higher level of participation in the social telephony firewall service, another subscriber who is a contact of the called subscriber, and so forth.
  • the method 300 determines that the calling device satisfies one or more thresholds regarding a level of tagging, the method proceeds to step 340 where the method filters the call. For example, if there are multiple thresholds specified in the filtering rules of the subscriber profile, depending upon which threshold has been met, the method may implement a particular call handling as specified in the associated filtering rule. For example, a filtering rule may specify a threshold of 50 tags of a calling device as being a source of undesirable calls. The filtering rule may further specify that when a call is received from a calling device that satisfies this threshold, the call should be rerouted to a voicemail server.
  • the voicemail server may play a pre-recorded announcement for the caller prior to allowing the caller to leave a voice message for the subscriber.
  • the filtering rule may specify that that the call should be blocked, dropped, routed to another endpoint device, and so forth.
  • the filtering rule may specify that a notification message should be sent back to the calling device indicating that the call has been blocked, dropped, rerouted, and so forth.
  • step 330 the method determines that the device of the caller does not satisfy any threshold(s) of any filtering rules defined by the subscriber in the subscriber profile, the method proceeds to step 360 .
  • the method connects the call to the device of the subscriber.
  • the method 300 may implement normal call processing/routing to establish the call.
  • step 370 the method 300 obtains feedback from the device of the subscriber following the call.
  • step 370 may involve the same or similar functions to those described above in connection with step 230 of FIG. 2 .
  • step 380 the method 300 provides a notification of a reward to the subscriber, e.g., when the subscriber provides a more detailed description regarding the call at step 370 .
  • step 380 may comprise the same or similar functions to those described above in connection with step 240 of FIG. 2 .
  • step 395 the method ends.
  • FIG. 4 illustrates a flowchart of a method 400 for processing call.
  • the method 400 can be deployed in and/or performed by an endpoint device of a subscriber, e.g., a wired or wireless telephone, a softphone, a terminal adapter, a cellular phone, and so forth.
  • an endpoint device of a subscriber e.g., a wired or wireless telephone, a softphone, a terminal adapter, a cellular phone, and so forth.
  • one or more steps, operations or functions of the method 400 may be implemented by a general purpose computer having a processor, a memory and input/output devices as illustrated below in FIG. 5 , specifically programmed to perform the steps, functions and/or operations of the method.
  • Method 400 starts in step 405 and proceeds to step 410 .
  • the method 400 receives a call for a subscriber from a device of a caller via a communication network.
  • the subscriber may be a subscriber/customer of the communication network.
  • the method 400 receives an indication that the call is an undesirable call.
  • the method 400 may prompt the subscriber at the end of the call to indicate whether the call was an undesirable call.
  • step 420 may comprise receiving a subscriber input during or after the call to indicate that the call is an undesirable call.
  • the subscriber may provide a voice command or enter a predetermined sequence of keys/tones to indicate a desire to tag the call as an undesirable call.
  • the indication that the call is an undesirable call further includes a description of the call. The description of the call may comprise a type of call, a purpose of the call, characteristics of the caller, and so forth.
  • the method 400 transmits the indication that the call is an undesirable call to the communication network.
  • the method 400 may transmit the indication to an application server in the communication network that implements a social telephony firewall service in accordance with the present disclose.
  • the indication further includes the description of the call obtained at step 420 .
  • the indication that the call is an undesirable call comprises a tag that is forwarded to the communication network. The tag may be aggregated with other tags pertaining to the same caller/source identifier of the calling device for use in subsequent call blocking, call rerouting, and other call treatment according to subscriber profiles of other subscribers.
  • the method 400 provides a notification of a reward to the subscriber.
  • the method 400 receives a notification of the reward from the communication network and passes the notification to the subscriber.
  • the method may display a text message or play an audio recording, depending upon the format of the notification received from the communication network and/or the playback preferences of the subscriber.
  • step 440 the method 400 proceeds to step 495 where the method ends.
  • one or more steps, functions or operations of the respective methods 200 , 300 and 400 may include a storing, displaying and/or outputting step as required for a particular application.
  • any data, records, fields, and/or intermediate results discussed in the methods can be stored, displayed and/or outputted either on the device executing the methods 200 , 300 or 400 , or to another device, as required for a particular application.
  • steps, blocks, functions or operations in FIGS. 2-4 that recite a determining operation or involve a decision do not necessarily require that both branches of the determining operation be practiced. In other words, one of the branches of the determining operation can be deemed as an optional step.
  • steps, blocks, functions or operations of the above described methods can be combined, separated, and/or performed in a different order from that described above, without departing from the example embodiments of the present disclosure.
  • FIG. 5 depicts a high-level block diagram of a general-purpose computer suitable for use in performing the functions described herein.
  • the system 500 comprises a hardware processor element 502 (e.g., a central processing unit (CPU) or a microprocessor), a memory 504 , e.g., random access memory (RAM) and/or read only memory (ROM), a module 505 for providing a social telephony firewall service, and various input/output devices 506 (e.g., storage devices, including but not limited to, a tape drive, a floppy drive, a hard disk drive or a compact disk drive, a receiver, a transmitter, a speaker, a display, a speech synthesizer, an output port, an input port and a user input device (such as a keyboard, a keypad, a mouse, a microphone and the like)).
  • a hardware processor element 502 e.g., a central processing unit (CPU) or a microprocessor
  • RAM random access
  • instructions and data for the present module or process 505 for providing a social telephony firewall service can be loaded into memory 504 and executed by processor 502 to implement the steps, functions or operations as discussed above in connection with the exemplary methods 200 , 300 and 400 .
  • the processor executing the computer readable or software instructions relating to the above described method(s) can be perceived as a programmed processor or a specialized processor.
  • the present module 505 for providing a social telephony firewall service (including associated data structures) of the present disclosure can be stored on a tangible or physical (broadly non-transitory) computer-readable storage device or medium, e.g., volatile memory, non-volatile memory, ROM memory, RAM memory, magnetic or optical drive, device or diskette and the like.
  • the computer-readable storage device may comprise any physical devices that provide the ability to store information such as data and/or instructions to be accessed by a processor or a computing device such as a computer or an application server.

Abstract

A method receives a call from a device of a caller destined to a device of a subscriber of a communication network. The method connects the call to the device of the subscriber and then receives from the device of the subscriber an indication that the call is an undesirable call. The indication further includes a description of the call. The method then provides a reward to the subscriber when the indication further includes the description of the call.

Description

The present disclosure relates generally to communication networks and, more particularly, to detecting and preventing calls from unwanted callers using feedback from subscribers.
BACKGROUND
Unwanted or undesirable calls present a particular problem for many network subscribers as well as for the communication network infrastructure. For example, telemarketers, survey outfits, charities, political groups and others may continually place calls to large numbers of subscribers. Many times the callers are deemed to be pushy or aggressive by the recipients of such calls. In addition, many entities continue to place calls to the same subscriber despite having been asked to stop calling. In some cases, these unwanted calls result in usage charges to a subscriber, further adding to the subscriber's frustration. There are schemes in place to address these problems. For example, with respect to cellular networks, current Federal Communication Commission (FCC) regulations do not permit telemarketers to use auto dialers to place calls to mobile phones. However, many subscribers report that such calls are still being received. Aggressive telemarketers also benefit from the increased deployment and availability of Voice over Internet Protocol (VoIP) equipment and services. For example, a telemarketer may use a VoIP based auto dialer to place large numbers of calls over the Internet. The telemarketer may change locations and equipment often enough to effectively avoid meaningful detection and countermeasures. Do-not-call registries/lists exist in many jurisdictions. However, subscribers often report that certain callers are ignoring the do-not-call list(s). In addition, certain callers are exempt from complying with do-not-call laws and regulations, e.g., political callers, charities and local businesses.
SUMMARY
In one embodiment, the present disclosure describes a method for processing a call. For example, the method receives the call from a device of a caller destined to a device of a subscriber of a communication network. The method connects the call to the device of the subscriber and then receives from the device of the subscriber an indication that the call is an undesirable call. The indication further includes a description of the call. The method then provides a reward to the subscriber when the indication further includes the description of the call.
In another embodiment, the present disclosure describes a method for filtering a call. For example, the method receives the call from a device of a caller destined to a device of a subscriber of a communication network and retrieves a profile of the subscriber. The profile specifies a threshold for filtering the call from the device of the caller. The threshold is determined by the subscriber and comprises a level of tagging, by other subscribers of the communication network, associated with a source identifier of the device of the caller being identified as a source of an undesirable call. The method then determines the source identifier of the device of the subscriber satisfies the threshold. When the threshold is satisfied, the method filters the call according to the profile of the subscriber.
In still another embodiment, the present disclosure describes a further method for processing a call. For example, the method receives the call from a device of a caller via a communication network. The method then obtains from the subscriber an indication that the call is an undesirable call. The indication further includes a description of the call. The method then transmits to the communication network the indication that includes the description of the call and receives from the communication network a notification of a reward to the subscriber in response to the transmitting to the communication network the indication that includes the description of the call.
BRIEF DESCRIPTION OF THE DRAWINGS
The teaching of the present disclosure can be readily understood by considering the following detailed description in conjunction with the accompanying drawings, in which:
FIG. 1 illustrates an exemplary network related to the present disclosure;
FIG. 2 illustrates a flowchart of a method for processing a call, according to the present disclosure;
FIG. 3 illustrates a flowchart of a method for filtering a call, according to the present disclosure;
FIG. 4 illustrates a flowchart of a further method for processing a call, according to the present disclosure; and
FIG. 5 illustrates a high-level block diagram of a general-purpose computer suitable for use in performing the functions, methods and algorithms described herein.
To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures.
DETAILED DESCRIPTION
The present disclosure describes social telephony firewall devices, methods and computer-readable media that leverage a subscriber base of a communications network and/or contacts of a subscriber to identify sources of undesirable calls and to filter calls from these sources for alternative call handling. For example, after a call, a subscriber may be prompted by his or her endpoint device or by the network to engage a tagging service for tagging the call as an undesirable call. In one embodiment, the subscriber may then be additionally prompted to further categorize the call. For example, the subscriber may provide a description of the call, e.g., the type of call, the purpose of the call and/or characteristics of the caller. A description of the type of call may comprise: an automated call, a sales call, a fundraiser call, a political call, a telemarketer call, a survey call, etc. A description of the purpose of the call may relate to the subject of the call, e.g., a particular product or service (e.g., insurance sales, timeshare sales, car sales, telecommunications service sales and the like), political advocating, political fundraising, a survey about television programming, a survey about public transportation services, etc. Characteristics of the caller may describe the attitude or manner of the caller, e.g., whether the caller was aggressive, impolite, rude and so forth. A description of a characteristic of the caller may further include a scale for the subscriber to rank the characteristic of the caller (e.g., 1 to 10, where 1 is not at all abusive and 10 is most abusive, etc.). The user may select from choices using a touchpad, or be engaged through an interactive voice response (IVR) system either on the subscriber's endpoint device or hosted in the network. In one example, after the subscriber provides an initial description of the call, the subscriber may also be prompted to provide more detailed information regarding the call. For instance, if the subscriber first identifies a call as a sales call (e.g., a type of call), the subscriber may be prompted to provide further indication that the call related to a car sales offer, a restaurant discount offer, an insurance offer, etc. (e.g., a purpose of the call).
When a particular caller has been tagged by a threshold number of times by different subscribers, the caller may then be filtered, e.g., blocked, warned, throttled, etc. In one example, subsequent calls from the caller to a subscriber may be given a different call handling, e.g., sending the call automatically to a subscriber's voicemail with an introductory recording that indicates the call was flagged as being from an undesirable caller. It should be noted that the subscribers may tag calls, which are then aggregated by source identifiers of the devices of the callers. For example, the device of the caller may be identified across different calls based upon one or more different source identifiers, including: a telephone number, a mobile equipment identifier (MEID), an International Mobile Equipment Identity (IMEI) number, an Internet Protocol (IP) address, a Session Initiation Protocol (SIP) address or other device identifier.
The subscriber receiving the call may not actually be aware of one or more of the source identifiers of the device of the caller. For instance, the subscriber typically would not know the IMEI number of the caller's device. In addition, the caller may have caller identification (ID) blocking activated. However, these source identifiers are typically more readily available to the network provider. Thus, from the perspective of a subscriber, the subscriber may simply tag a call. From the perspective of the network, the same tag may relate to both the call as well as the calling device (e.g., as determined by the source identifier) or the caller. The network will aggregate subscriber's tags of incoming calls by source identifiers of the devices of callers. Thus, the present disclosure may interchangeably refer to tagging a call, tagging a device of a caller, tagging a caller, or tagging a source identifier of a caller.
In one example, the threshold for filtering a caller is based not upon exceeding a raw number of tags, but is based upon a rate at which calls from the caller are tagged, e.g., 100 tags per week, etc. The network may maintain counts, or scores regarding a level of tagging for any calling device that has been tagged at least once as being a source of an undesirable call. The method may also store other information in connection with calling devices, including counts of the number of subscribers who have indicated that the caller is of a particular category, average scores of the caller on various characteristics scales, e.g., an average ranking of 9 out of 10 on an abusiveness scale as ranked by subscribers who have given feedback regarding the caller, and so forth.
In one example, the network sets default settings for subscribers of the social telephony firewall service. For instance, the network may set a threshold to block calls from callers that have been tagged 100 times or more. Each subscriber may then modify the default settings, e.g., a subscriber can request that calls be blocked from all callers that have been tagged only 50 times. In another example, a subscriber may set his/her personal preferences such that all calls from callers that have exceeded a particular tagging threshold for a particular category (e.g., insurance sales) should be blocked. On the other hand, another subscriber may allow such callers if the subscriber does not object to such callers even when such callers have exceeded the tagging threshold. For example, the subscriber may currently be shopping for insurance and may temporarily welcome receiving insurance sales calls. A different subscriber may desire to allow all sales calls except for calls from callers who have been tagged as abusive more than a threshold number of times. Subscribers may also vary their configurations depending upon the time of day, e.g., using a lower threshold for blocking callers during business hours and using a higher threshold for other times, e.g., after 5:00 pm.
As an incentive to subscribers to participate and to provide further levels of detail regarding undesirable calls, the network may provide rewards to a subscriber based upon the number of tags of undesirable calls provided by the subscriber. For example, a subscriber may tag a call as an undesirable call. In addition, the subscriber may further provide a description of the call that indicates the type of call, the purpose of the call and/or characteristics of the caller. For instance, the subscriber may indicate that the call is a sales call, that the caller ranked as 7 out of 10 in terms of rudeness, and so forth. For instance, the subscriber may choose between a number of predefined choices provided by the network for categorizing the call. The subscriber may be given a reward, or a greater reward as compared to if the subscriber simply tagged the call as an undesirable call and did not provide the additional description(s) regarding the call. For example, the network may provide credits to the subscriber's account, subsidize the social telephony firewall service to a greater degree for the subscriber, offer redeemable rewards points, and so forth.
As further incentive, or simply as feature of the social telephony firewall service, in one example the tags of subscribers with a greater level of participation and who provide greater level of detail may be afforded greater weight in calculating a level of tagging of a caller. For instance, if a subscriber consistently provides extra information (i.e., more detailed descriptions) regarding tagged calls/callers, the subscriber's tags may be given greater weight in calculating a tagging score of the caller. Such subscribers may be deemed to be “valued” tagging subscribers or “trusted” tagging subscribers. For example, a default threshold for a caller being tagged as a source of undesirable calls may be “100”. When a subscriber deemed to have a high level of participation tags a particular caller, the subscriber's tag may count twice or 1.5 times towards meeting this threshold, whereas a tag from a subscriber who only tags calls without provide further description and further details may have his or her tag be counted at face value, e.g., 1, or even at a discounted weight e.g., 0.75. Thresholds for determining when a subscriber is considered to be a “valued tagging subscriber” may be set by the network. Similarly, the relative weighting to apply to the tagging of different categories of subscriber may also be set by the network.
To aid in understanding the present disclosure, FIG. 1 illustrates a block diagram of an exemplary communication system 100, constructed in accordance with one or more aspects of the disclosure. The present disclosure may be embodied as a network-based server hosting and/or executing a social telephony firewall service to process incoming calls, e.g., call setup/signaling messages, to perform filtering of the incoming calls prior to forwarding to subscriber devices, and to aggregate and store tagging information provided by various subscribers regarding sources of undesirable calls, and to perform other functions described above. For example, the present disclosure may comprise a software tool that is deployed on an application server, a call control element, a border element or other network-based device or server. Although the present disclosure is discussed below in the context of exemplary access networks and an Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) core network, the present disclosure is not so limited. Namely, the present disclosure can be applied to communication networks in general, e.g., cellular networks, Internet Protocol (IP) Multimedia Subsystem (IMS) networks, asynchronous transfer mode (ATM) networks, and the like, or any other network suitable for voice telephony.
As illustrated in FIG. 1, endpoint devices 102-107 are configured for communication with the network 110 (e.g., an IP/MPLS core backbone network, supported by a service provider) via access networks 101 and 108. The endpoint devices 102-107 may comprise wired and wireless phones, cellular phones, terminal adapters, personal computers, laptop computers, personal digital assistants (PDAs), servers, and the like. In one embodiment, any one or more of endpoint devices 102-107 may comprise a subscriber device (e.g., a device of a subscriber of network 110) or may comprise a device of a user whose communications will be carried via the network 110 (e.g., a non-subscriber). The access networks 101 and 108 serve as a conduit to establish a connection between the endpoint devices 102-107 and the border elements (BEs) 109 and 111 of the core network 110. The access networks 101, 108 may each comprise a digital subscriber line (DSL) network, a broadband cable access network, a local area network (LAN), a wireless access network (WAN), a cellular/mobile network, a wireless fidelity (Wi-Fi) network, the Internet, and the like.
BEs 109 and 111 are network elements which reside at the edge of the core infrastructure and interface with endpoint devices for signaling and routing purposes over various types of access networks. A BE is typically configured to serve as an edge router, a media gateway, a firewall, and the like. Network 110 may also include a call control element (CCE) 114, a media server (MS) 118 and other network elements, e.g., NE 119, which may comprise a voicemail server, a honeypot, a tarpit, or other network component. The CCE 114 is typically implemented as a media gateway controller or a softswitch and performs network wide call control related functions as well as interacts with the appropriate service related servers, when necessary. The CCE 114 functions as a session initiation protocol (SIP) back-to-back user agent and is a signaling endpoint for all call legs between all BEs and the CCE 114. Media server 118 typically handles and terminates media streams, and provides services such as announcements, bridges, transcoding, and Interactive Voice Response (IVR) messages.
Network 110 may also comprise an application server (AS) 112 that contains a database 115. The application server 112 may comprise any server or computer that is well known in the art, and the database 115 may be any type of electronic collection of data that is well known in the art. For example, AS 112 and DB 115 may be implemented as a computing device such as illustrated in FIG. 5 and described below. In one embodiment, AS 112 may store and retrieve subscriber profiles from DB 115, e.g., preferences and filtering rules regarding handling of undesirable calls in accordance with the present disclosure. AS 112/DB 115 may also collect, gather and store information on the tagging of callers and/or the devices of such callers as sources of undesirable calls. In other words, AS 112/DB 115 may provide various aspects of a social telephony firewall service in accordance with the present disclosure.
In one example, if the network 110 receives a call towards the endpoint device 102 (e.g., a subscriber device) from endpoint device 105 (e.g., a calling endpoint device), the call control element (CCE) 114 may receive the signaling message to setup the call. For example, if a call is originated by the endpoint device 105 towards the endpoint device 102, the CCE 114 may receive a setup message, e.g., SIP signaling message, for setting up the call. Typically, the CCE 114 determines the routing logic for the destination address and forwards the signaling message towards the appropriate signaling gateway router serving the called party destination (in this case BE 109), as part of the normal process of establishing a call via network 110.
In accordance with the present disclosure, the CCE 114 may communicate with AS 112 to determine the routing logic for handling the call. For instance, AS 112 may retrieve information stored in DB 115 regarding the subscriber preferences of the subscriber associated with the called endpoint device 102. AS 112 may also retrieve information stored in DB 115 regarding tagging of the calling endpoint device, e.g., based upon information in the call setup signaling message from CCE 114. For example, AS 112 may look up the calling endpoint device 105, in the database and retrieve information regarding a level of tagging of the calling endpoint device/caller as a source of undesirable calls. The calling endpoint device may be referenced by any of the above described source identifiers such as a telephone number, IMEI number, etc. If a record exists for the caller/calling endpoint device, AS 112 may then apply the call the filtering rule(s) contained in the subscriber profile of the subscriber of endpoint device 102.
If the call does not match one of the filtering rules, then AS 112 may indicate to the CCE 114 that the call setup signaling message should be forwarded to BE 109 for normal call processing. On the other hand, if the caller/endpoint device 105 matches one of the filtering rules, then the AS 112 may provide call routing logic for the CCE to filter the call and/or to perform alternative call handling, as directed by the filtering rule of the subscriber. For example, the CCE 114 may be provided with routing logic to drop or block the call, to provide a message back to the endpoint device 105 indicating that the call has been blocked, to forward the call to a voicemail server, e.g., NE 119, for the caller to leave a message for the subscriber of endpoint device 102, and so forth.
In one embodiment, the application server 112 may also receive tag information from subscriber devices (e.g., any one or more of endpoint devices 102-107) via the border elements 109 and 111. In another embodiment, the border elements 109 and 111 may periodically upload aggregate tagging information to the application server 112 and/or the database 115. In particular, at the end of a call, a subscriber may tag the call as an undesirable call, and may provide a further description regarding the call, e.g., a type of call, a purpose of the call and/or characteristics of the caller. The subscriber may provide such information on his or her own initiative, or may be prompted by the subscriber's device and/or by a network element of network 110. For example, the caller may press a predefined series of keys (e.g., *99) at the end of the call to indicate that the caller is tagging the call as an undesirable call. The caller may then have the opportunity to provide the further information regarding the call/caller. For instance, BE 109 may recognize the predefined tone sequence as a request to tag the call. The BE 109 may signal to CCE 114 that a session should be established between endpoint device 102 and AS 112 to allow the subscriber to provide a further description of the call. In one example, the session may include MS 118, e.g., to engage the subscriber in an IVR dialog to solicit further information from the subscriber.
Regardless of the manner in which AS 112 comes to possess such tagging information and call descriptions from the subscribers, the responses of the subscribers may then be stored in DB 115. In particular, if a call is tagged, the AS 112 may aggregate the tag with any other previous tags regarding the same calling endpoint device/caller. Any new or updated information regarding the caller/calling endpoint device may then be used by AS 112 in conjunction with subscribers' profiles/filtering rules to determine how to handle future calls from the calling endpoint device to any other subscribers of network 110. In addition, subscribers may interact with AS 112 to update, modify or change their preferences, e.g., filter rules contained in subscriber profiles regarding the preferred handling of undesirable calls. For example, subscribers may access AS 112 over a web interface, via a personal computer, using a dial-in IVR system or other automated response system (e.g., implemented by MS 118), and so forth.
The above IP network is described only to provide an illustrative environment in which voice, data and video packets can be transmitted on communication networks and in which various embodiments of the present disclosure may be employed. Thus, those skilled in the art will realize that although only six endpoint devices, two access networks, and five network elements (NEs) are depicted in FIG. 1, the system 100 may be expanded by including additional endpoint devices, access networks, and network elements without altering the present disclosure. Similarly, although various network elements are shown as discrete components, those skilled in the art will realize that one or more of such components may be consolidated into a lesser number of network elements and that functions described in connection with a particular network element may in fact be assigned to a different network element. For example, the CCE 114 and AS 112 may, in one example, comprise a single device. In another example, the functions of AS 112 and DB 115 may be implemented in BE 109 and/or BE 111 instead. In other words, the social telephony firewall service of the present disclosure may be implemented in a border element, e.g., in a signaling and/or media gateway, instead of in the AS 112, as illustrated. Various other system architectures and modifications of this nature are possible in accordance with the present disclosure, as will be appreciated by those skilled in the art.
To further aid in understanding the present disclosure, FIG. 2 illustrates a flowchart of a method 200 for processing a call. In an embodiment, the method 200 can be deployed in and/or performed by the application server for providing a social telephony firewall service. However, in other, further and different embodiments, the method 200 may be performed by one or more other devices, such as any one or more of the devices shown in system 100 of FIG. 1. In one embodiment, the method 200 is performed by a general purpose computing device having a processor, a memory and input/output devices as illustrated below in FIG. 5, specifically programmed to perform the steps, functions and/or operations of the method.
Method 200 starts in step 205 and proceeds to step 210.
In step 210, method 200 receives a call from a device of a caller destined to a device of a subscriber via a communication network. For example, the method 200 may receive a call setup signaling message for the device of the subscriber forwarded from an access network to the communication network.
In step 220, the method 200 connects the call to the device of the subscriber. For example, the method may consult a social telephony firewall service profile of the subscriber. If the device of the caller does not fall within any filtering rules of the subscriber, the method 200 may simply allow normal call signaling and setup to proceed to allow the call to be established between the device of the caller and the device of the subscriber.
At step 230, the method 200 receives an indication that the call is an undesirable call. For example, the subscriber may dial a predetermined sequence e.g., “*99”, in order to signal to the method 200 that the subscriber is tagging the call as an undesirable call. In another embodiment the subscriber may signal a desire to tag the call using a voice command. For example, the method 200 may recognize a voice command uttered by the subscriber as signaling a desire to tag the call.
At step 230, the method may also prompt the subscriber to provide a description of the call. For example, the method may prompt the subscriber to indicate a type of the call, a purpose of the call, a characteristic of the caller, scores/ratings of the caller with respect to one or more characteristics, and so forth. In response, the subscriber may then volunteer further information regarding the call. However, in another example, the subscriber may simply volunteer such information along with an indication that the call is an undesirable call, which is received by the method at step 230.
At step 240, the method 200 provides a notification of a reward to the subscriber when the indication received at step 230 includes a description of the call. For example, if the subscriber provides additional information beyond simply tagging the call as an undesirable call, the subscriber may be provided a reward such as a service credit with the communication network for a service provided by the communication network, e.g., conferencing service, a data plan service, or redeemable rewards points that can be used for purchasing items with a partner retailer and so forth. In one embodiment, the notification may comprises an automated voice call, a voice message, an email message, a text message, and so forth, depending upon the capabilities of the communication network and/or the preferences of the subscriber for receiving such notification. In one embodiment, the method 200 selects a level of reward to provide to the subscriber based upon the level of detail regarding the tagged call provided by the subscriber at step 230. In other words, the more information provided by the subscriber, the greater the reward will be selected for the subscriber and indicated in the notification that is sent at step 240.
Following step 240, the method 200 proceeds to step 295 where the method ends.
FIG. 3 illustrates a flowchart of a method 300 for filtering a call. In one embodiment, the method 300 can be deployed in and/or performed by an application server for providing a social telephony firewall service. However, in other, further and different embodiments, the method 300 may be performed by any one or more of the other devices shown in system 100 of FIG. 1, e.g., a call control element, a border element, and so forth. In one embodiment, the method 300 is performed by a general purpose computing device having a processor, a memory and input/output devices as illustrated below in FIG. 5, specifically programmed to perform the steps, functions and/or operations of the method.
Method 300 starts in step 305 and proceeds to step 310. In step 310, method 300 receives a call from a device of a caller destined to a device of a subscriber via a communication network. For example, the method 300 may receive a call setup signaling message for the device of the subscriber forwarded from an access network to the communication network.
In step 320, method 300 retrieves a subscriber profile associated with the subscriber and/or the device of the subscriber. For example, the device of the subscriber may be identified based upon call destination/recipient information in the call setup signaling message. The profile may include filtering rules determined by the subscriber which set one or more thresholds with respect to a level of tagging of callers that dictates when a call from a device of caller should be filtered for alternative call handling. For example, one filtering rule may specify that calls be blocked from all callers who have been tagged more than a threshold, e.g., 50 times. In one embodiment, the subscriber may also configure the profile to vary various thresholds and preferences depending upon the time of day, certain categories of callers, and so forth.
The subscriber profile may also specify certain rules regarding the weights to apply to tags of other subscribers. For example, the subscriber may set a threshold of “100” for blocking calls from undesirable callers. In one example, 80 subscribers may have already tagged calls originating from a particular calling device as being a source of undesirable calls. Using a raw count, this particular calling device has not yet exceeded the subscriber defined threshold of 100. However, the subscriber may further specify that tags of contacts (e.g., friends and family) of the subscriber should be given a weight of “5”. Thus, if five of the 80 subscribers who have tagged the calling device are also contacts of the subscriber, the overall weighted score may be recalculated as (75+(5×5)=100). In this scenario, the calling device does satisfy the threshold of 100 and the call is subject to blocking or other alternative call handling as specified in the subscriber profile. In a similar example, greater weight may be afforded to tags from other “valued” tagging subscribers in the social telephony firewall service. The weightings may be applied by default or may be specified by the subscriber as part of his/her individual profile. It should be noted that the method 300 may determine which subscribers are contacts using any presently available techniques. For instance, the method may simply look at a contact list of the subscriber stored on the device of the subscriber or in a subscriber profile stored within the communication network. In another example, the method may have access to social network profile information regarding the subscriber and his or her contacts via the social network. For example, the method may access such information via a social network gateway (SNG) between the communication network and the social network.
At step 330, the method 300 determines whether the device of the caller has exceeded a threshold level of tagging by other subscribers of the communication network. In one embodiment, step 330 includes comparing the stored information regarding the device of the caller against one or more of the filtering rules in the subscriber profile of the called subscriber retrieved at step 320 to determine whether the device of the caller exceeds a threshold level of tagging. For instance, as described above a count of a number of tags of a particular device of a caller may be maintained. In addition to a count of a number of tags relating to the caller/calling device being identified a source of an undesirable call, additional information may be available such as a count of the number of times the caller has been tagged as being a particular type of caller, e.g., a telemarketer, a charity, a survey entity, a political organization, etc., more detailed category information, e.g., timeshare sales, insurance sales, car sales, and the like, as well as average scores of the caller across different characteristics categories, e.g., rudeness, aggressiveness, persistence, and so on. In other words, step 330 may comprise the application of different thresholds to different types of aggregate information available regarding the device of the caller, e.g., type of call information, purpose of call information, and caller characteristics information.
In one embodiment, at step 330 the method 300 applies weightings to various tags prior to determining whether the calling device satisfies a threshold of one or more filtering rules contained in the subscriber profile. For instance, step 330 may involve applying weights to one or more of the tags depending upon which subscriber provided the tag, e.g., a subscriber with a higher level of participation in the social telephony firewall service, another subscriber who is a contact of the called subscriber, and so forth.
If at step 330, the method 300 determines that the calling device satisfies one or more thresholds regarding a level of tagging, the method proceeds to step 340 where the method filters the call. For example, if there are multiple thresholds specified in the filtering rules of the subscriber profile, depending upon which threshold has been met, the method may implement a particular call handling as specified in the associated filtering rule. For example, a filtering rule may specify a threshold of 50 tags of a calling device as being a source of undesirable calls. The filtering rule may further specify that when a call is received from a calling device that satisfies this threshold, the call should be rerouted to a voicemail server. The voicemail server may play a pre-recorded announcement for the caller prior to allowing the caller to leave a voice message for the subscriber. In another example, the filtering rule may specify that that the call should be blocked, dropped, routed to another endpoint device, and so forth. In another example, the filtering rule may specify that a notification message should be sent back to the calling device indicating that the call has been blocked, dropped, rerouted, and so forth.
If at step 330, the method determines that the device of the caller does not satisfy any threshold(s) of any filtering rules defined by the subscriber in the subscriber profile, the method proceeds to step 360.
At step 360, the method connects the call to the device of the subscriber. For example, the method 300 may implement normal call processing/routing to establish the call.
At optional step 370, the method 300 obtains feedback from the device of the subscriber following the call. For example, step 370 may involve the same or similar functions to those described above in connection with step 230 of FIG. 2.
At optional step 380, the method 300 provides a notification of a reward to the subscriber, e.g., when the subscriber provides a more detailed description regarding the call at step 370. Notably, step 380 may comprise the same or similar functions to those described above in connection with step 240 of FIG. 2.
Following any of steps 340, 360, 370 or 380, the method 300 proceeds to step 395 where the method ends.
FIG. 4 illustrates a flowchart of a method 400 for processing call. In one embodiment, the method 400 can be deployed in and/or performed by an endpoint device of a subscriber, e.g., a wired or wireless telephone, a softphone, a terminal adapter, a cellular phone, and so forth. Alternatively, one or more steps, operations or functions of the method 400 may be implemented by a general purpose computer having a processor, a memory and input/output devices as illustrated below in FIG. 5, specifically programmed to perform the steps, functions and/or operations of the method.
Method 400 starts in step 405 and proceeds to step 410. In step 410, the method 400 receives a call for a subscriber from a device of a caller via a communication network. For example, the subscriber may be a subscriber/customer of the communication network.
At step 420, the method 400 receives an indication that the call is an undesirable call. In one example, the method 400 may prompt the subscriber at the end of the call to indicate whether the call was an undesirable call. Alternatively, step 420 may comprise receiving a subscriber input during or after the call to indicate that the call is an undesirable call. For example, as described above in connection with step 230 of FIG. 2, the subscriber may provide a voice command or enter a predetermined sequence of keys/tones to indicate a desire to tag the call as an undesirable call. In one example, the indication that the call is an undesirable call further includes a description of the call. The description of the call may comprise a type of call, a purpose of the call, characteristics of the caller, and so forth.
At step 430, the method 400 transmits the indication that the call is an undesirable call to the communication network. For example, the method 400 may transmit the indication to an application server in the communication network that implements a social telephony firewall service in accordance with the present disclose. In one example, the indication further includes the description of the call obtained at step 420. In one example, the indication that the call is an undesirable call comprises a tag that is forwarded to the communication network. The tag may be aggregated with other tags pertaining to the same caller/source identifier of the calling device for use in subsequent call blocking, call rerouting, and other call treatment according to subscriber profiles of other subscribers.
At step 440, the method 400 provides a notification of a reward to the subscriber. In one example, the method 400 receives a notification of the reward from the communication network and passes the notification to the subscriber. For example, the method may display a text message or play an audio recording, depending upon the format of the notification received from the communication network and/or the playback preferences of the subscriber.
Following step 440, the method 400 proceeds to step 495 where the method ends.
In addition, although not specifically specified, one or more steps, functions or operations of the respective methods 200, 300 and 400 may include a storing, displaying and/or outputting step as required for a particular application. In other words, any data, records, fields, and/or intermediate results discussed in the methods can be stored, displayed and/or outputted either on the device executing the methods 200, 300 or 400, or to another device, as required for a particular application.
Furthermore, steps, blocks, functions or operations in FIGS. 2-4 that recite a determining operation or involve a decision do not necessarily require that both branches of the determining operation be practiced. In other words, one of the branches of the determining operation can be deemed as an optional step. Furthermore, steps, blocks, functions or operations of the above described methods can be combined, separated, and/or performed in a different order from that described above, without departing from the example embodiments of the present disclosure.
FIG. 5 depicts a high-level block diagram of a general-purpose computer suitable for use in performing the functions described herein. As depicted in FIG. 5, the system 500 comprises a hardware processor element 502 (e.g., a central processing unit (CPU) or a microprocessor), a memory 504, e.g., random access memory (RAM) and/or read only memory (ROM), a module 505 for providing a social telephony firewall service, and various input/output devices 506 (e.g., storage devices, including but not limited to, a tape drive, a floppy drive, a hard disk drive or a compact disk drive, a receiver, a transmitter, a speaker, a display, a speech synthesizer, an output port, an input port and a user input device (such as a keyboard, a keypad, a mouse, a microphone and the like)).
It should be noted that the present disclosure can be implemented in software and/or in a combination of software and hardware, e.g., using application specific integrated circuits (ASIC), a general purpose computer or any other hardware equivalents. In one embodiment, instructions and data for the present module or process 505 for providing a social telephony firewall service can be loaded into memory 504 and executed by processor 502 to implement the steps, functions or operations as discussed above in connection with the exemplary methods 200, 300 and 400. The processor executing the computer readable or software instructions relating to the above described method(s) can be perceived as a programmed processor or a specialized processor. As such, the present module 505 for providing a social telephony firewall service (including associated data structures) of the present disclosure can be stored on a tangible or physical (broadly non-transitory) computer-readable storage device or medium, e.g., volatile memory, non-volatile memory, ROM memory, RAM memory, magnetic or optical drive, device or diskette and the like. More specifically, the computer-readable storage device may comprise any physical devices that provide the ability to store information such as data and/or instructions to be accessed by a processor or a computing device such as a computer or an application server.
While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.

Claims (20)

What is claimed is:
1. A method for filtering a call, comprising:
receiving, by a processor deployed in a communication network, the call from a device of a caller destined to a device of a subscriber of the communication network;
retrieving, by the processor, a profile of the subscriber that specifies a threshold for filtering the call, wherein the threshold specifies a level of tagging, by other subscribers of the communication network, wherein the level of tagging is associated with a source identifier of the device of the caller being identified as a source of undesirable calls, wherein the threshold is determined by the subscriber, wherein a tag by a first of the other subscribers that is in a contact list of the subscriber is given a greater weight in determining the level of tagging as compared to a tag by a second of the other subscribers that is not in the contact list of the subscriber;
determining, by the processor, the source identifier of the device of the caller satisfies the threshold; and
filtering, by the processor, the call according to the profile of the subscriber when the source identifier of the device of the caller is determined to satisfy the threshold.
2. The method of claim 1, wherein the filtering the call according to the profile of the subscriber comprises:
blocking the call;
sending a notification to the device of the caller; or
sending the call to a voicemail server associated with the subscriber.
3. The method of claim 1, wherein the level of tagging comprises a number of tags, by the other subscribers, of calls from the device of the caller.
4. The method of claim 1, wherein a tag the first of the other subscribers who is further a valued tagging subscriber that is given a greater weight in determining the level of tagging as compared to a tag by the second of the other subscribers who is not a valued tagging subscriber.
5. The method of claim 1, wherein the threshold specifies a rate of tagging of calls originating from the device of the caller by the other subscribers.
6. The method of claim 1, wherein the threshold is adjustable by the subscriber based upon a time of day.
7. The method of claim 1, wherein the threshold is one of a plurality of thresholds, wherein each of the plurality of thresholds is associated with a different category of caller.
8. The method of claim 1, wherein the profile of the subscriber specifies that the threshold is to be applied when the device of the caller is identified as being associated with a particular category of calls that is defined by the subscriber as being an undesirable category.
9. The method of claim 8, wherein the particular category of calls comprises one of:
telemarketing calls;
political calls;
charity calls; or
survey calls.
10. A non-transitory computer readable medium storing a plurality of instructions which, when executed by a processor deployed in a communication network, cause the processor to perform operations for filtering a call, the operations comprising:
receiving the call from a device of a caller destined to a device of a subscriber of the communication network;
retrieving a profile of the subscriber that specifies a threshold for filtering the call, wherein the threshold specifies a level of tagging, by other subscribers of the communication network, wherein the level of tagging is associated with a source identifier of the device of the caller being identified as a source of undesirable calls, wherein the threshold is determined by the subscriber, wherein a tag by a first of the other subscribers that is in a contact list of the subscriber is given a greater weight in determining the level of tagging as compared to a tag by a second of the other subscribers that is not in the contact list of the subscriber;
determining the source identifier of the device of the caller satisfies the threshold; and
filtering the call according to the profile of the subscriber when the source identifier of the device of the caller is determined to satisfy the threshold.
11. The non-transitory computer readable medium of claim 10, wherein the filtering the call according to the profile of the subscriber comprises:
blocking the call;
sending a notification to the device of the caller; or
sending the call to a voicemail server associated with the subscriber.
12. The non-transitory computer readable medium of claim 10, wherein the level of tagging comprises a number of tags, by the other subscribers, of calls from the device of the caller.
13. The non-transitory computer readable medium of claim 10, wherein a tag the first of the other subscribers who is further a valued tagging subscriber that is given a greater weight in determining the level of tagging as compared to a tag by the second of the other subscribers who is not a valued tagging subscriber.
14. The non-transitory computer readable medium of claim 10, wherein the threshold specifies a rate of tagging of calls originating from the device of the caller by the other subscribers.
15. The non-transitory computer readable medium of claim 10, wherein the threshold is adjustable by the subscriber based upon a time of day.
16. The non-transitory computer readable medium of claim 10, wherein the threshold is one of a plurality of thresholds, wherein each of the plurality of thresholds is associated with a different category of caller.
17. The non-transitory computer readable medium of claim 10, wherein the profile of the subscriber specifies that the threshold is to be applied when the device of the caller is identified as being associated with a particular category of calls that is defined by the subscriber as being an undesirable category.
18. The non-transitory computer readable medium of claim 17, wherein the particular category of calls comprises one of:
telemarketing calls;
political calls;
charity calls; or
survey calls.
19. An apparatus deployed in a communication network for filtering a call, comprising:
a processor; and
a computer readable medium storing a plurality of instructions which, when executed by the processor, cause the processor to perform operations, the operations comprising:
receiving the call from a device of a caller destined to a device of a subscriber of the communication network;
retrieving a profile of the subscriber that specifies a threshold for filtering the call, wherein the threshold specifies a level of tagging, by other subscribers of the communication network, wherein the level of tagging is associated with a source identifier of the device of the caller being identified as a source of undesirable calls, wherein the threshold is determined by the subscriber, wherein a tag by a first of the other subscribers that is in a contact list of the subscriber is given a greater weight in determining the level of tagging as compared to a tag by a second of the other subscribers that is not in the contact list of the subscriber;
determining the source identifier of the device of the caller satisfies the threshold; and
filtering the call according to the profile of the subscriber when the source identifier of the device of the caller is determined to satisfy the threshold.
20. The apparatus of claim 19, wherein the filtering the call according to the profile of the subscriber comprises:
blocking the call;
sending a notification to the device of the caller; or
sending the call to a voicemail server associated with the subscriber.
US14/054,142 2013-10-15 2013-10-15 Network-based social telephony firewall Expired - Fee Related US9154621B2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US14/054,142 US9154621B2 (en) 2013-10-15 2013-10-15 Network-based social telephony firewall
US14/875,209 US9571642B2 (en) 2013-10-15 2015-10-05 Network-based social media telephony firewall
US15/430,743 US9942395B2 (en) 2013-10-15 2017-02-13 Network-based social telephony firewall

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US14/054,142 US9154621B2 (en) 2013-10-15 2013-10-15 Network-based social telephony firewall

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/875,209 Continuation US9571642B2 (en) 2013-10-15 2015-10-05 Network-based social media telephony firewall

Publications (2)

Publication Number Publication Date
US20150103990A1 US20150103990A1 (en) 2015-04-16
US9154621B2 true US9154621B2 (en) 2015-10-06

Family

ID=52809674

Family Applications (3)

Application Number Title Priority Date Filing Date
US14/054,142 Expired - Fee Related US9154621B2 (en) 2013-10-15 2013-10-15 Network-based social telephony firewall
US14/875,209 Expired - Fee Related US9571642B2 (en) 2013-10-15 2015-10-05 Network-based social media telephony firewall
US15/430,743 Active US9942395B2 (en) 2013-10-15 2017-02-13 Network-based social telephony firewall

Family Applications After (2)

Application Number Title Priority Date Filing Date
US14/875,209 Expired - Fee Related US9571642B2 (en) 2013-10-15 2015-10-05 Network-based social media telephony firewall
US15/430,743 Active US9942395B2 (en) 2013-10-15 2017-02-13 Network-based social telephony firewall

Country Status (1)

Country Link
US (3) US9154621B2 (en)

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7742581B2 (en) 2004-11-24 2010-06-22 Value-Added Communications, Inc. Electronic messaging exchange
US9876915B2 (en) 2005-01-28 2018-01-23 Value-Added Communications, Inc. Message exchange
US8300798B1 (en) 2006-04-03 2012-10-30 Wai Wu Intelligent communication routing system and method
US9621714B2 (en) 2009-01-27 2017-04-11 Value-Added Communications, Inc. System and method for electronic notification in institutional communication
US9742907B2 (en) 2013-12-05 2017-08-22 Esna Technologies Inc. System and method of providing social caller ID and caller rating on web calls
US10979558B2 (en) 2015-05-01 2021-04-13 Vyng, Inc. Management of media content associated with time-sensitive offers on mobile computing devices
US11381679B2 (en) 2015-05-01 2022-07-05 Vyng, Inc. Management of media content associated with call context on mobile computing devices
US11005990B2 (en) * 2015-05-01 2021-05-11 Vyng, Inc. Methods and systems for contact firewalls on mobile computing devices
US11451659B2 (en) 2015-05-01 2022-09-20 Vyng Inc. Dynamic rewardable activity value determination and allocation
US11394821B2 (en) 2015-05-01 2022-07-19 Vyng Inc. Curated search of entities from dial pad selections
US11394822B2 (en) 2015-05-01 2022-07-19 Vyng Inc. Incentivising answering call in smartphone lockscreen
US10951755B2 (en) 2015-05-01 2021-03-16 Vyng, Inc. Management of media content for caller IDs on mobile computing devices
US10965809B2 (en) 2015-05-01 2021-03-30 Vyng, Inc. Management of media content associated with a call participant on mobile computing devices
US10944863B2 (en) 2015-05-01 2021-03-09 Vyng, Inc. Management of media content derived from natural language processing on mobile computing devices
US10931819B2 (en) 2015-05-01 2021-02-23 Vyng, Inc. Management of media content associated with a user of a mobile computing device
US10938984B2 (en) 2015-05-01 2021-03-02 Vyng, Inc. Management of media content associated with ending a call on mobile computing devices
US11368575B2 (en) 2015-05-01 2022-06-21 Vyng, Inc. Management of calls and media content associated with a caller on mobile computing devices
US11394824B2 (en) 2015-05-01 2022-07-19 Vyng Inc. Adjusting presentation on smart phone lockscreen of visual content associated with metadata of incoming call
US10979559B2 (en) 2015-05-01 2021-04-13 Vyng, Inc. Management of calls on mobile computing devices based on call participants
US11394823B2 (en) 2015-05-01 2022-07-19 Vyng Inc. Configuring business application for utilization of sender controlled media service
US10237403B2 (en) * 2015-06-08 2019-03-19 Mark Stephen Block Communication blocking system and method
CN106943597A (en) * 2016-01-07 2017-07-14 博笛生物科技(北京)有限公司 Anti-EGFR for treating tumour is combined
US9942767B2 (en) 2016-07-21 2018-04-10 Global Business Software Development Technologies, Inc. Reducing fraudulent activity associated with mobile networks
US10749827B2 (en) 2017-05-11 2020-08-18 Global Tel*Link Corporation System and method for inmate notification and training in a controlled environment facility
US10805459B1 (en) 2018-08-07 2020-10-13 First Orion Corp. Call screening service for communication devices
US10659606B2 (en) * 2018-10-08 2020-05-19 International Business Machines Corporation Filtering unsolicited incoming calls

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6519332B1 (en) 1998-11-13 2003-02-11 Ericsson Inc. Mechanism for rejecting collect calls
US6650742B1 (en) * 2000-05-19 2003-11-18 Bbnt Solutions Llc Systems and methods for reducing the occurrence of annoying voice calls
US20040071281A1 (en) 2002-10-11 2004-04-15 Rashid Abid T. Telephony method, system and application for barring personal calls outside a local telephony system
US20050271196A1 (en) 2004-06-02 2005-12-08 Cynthia Florkey Network support for blocking calls based on calling party category
US20060093111A1 (en) * 2004-11-02 2006-05-04 Peck Michael C Method for charge-back on unwanted solicitations
US20060182029A1 (en) * 2005-02-15 2006-08-17 At&T Corp. Arrangement for managing voice over IP (VoIP) telephone calls, especially unsolicited or unwanted calls
US20070201650A1 (en) * 2000-11-06 2007-08-30 Mastro Michael P System and method for providing an anti-marketing feature in a network
US20080152111A1 (en) 2006-12-26 2008-06-26 Motorola, Inc. Handling of incoming calls
US20100172482A1 (en) * 2006-10-18 2010-07-08 Keith Alan Fotta Automatic Reporting of Unwanted or Unlawful Telephonic Communication
US20100183139A1 (en) 2009-01-16 2010-07-22 At&T Mobility Ii Llc Categorization and routing of calls based on genre
US8005074B2 (en) 2006-05-19 2011-08-23 Nec Europe Ltd. Method for identifying undesired telephone calls
US8141133B2 (en) 2007-04-11 2012-03-20 International Business Machines Corporation Filtering communications between users of a shared network
US8270588B2 (en) 2006-10-04 2012-09-18 Ronald Schwartz Method and system for incoming call management
US8363803B2 (en) 2009-03-31 2013-01-29 Centurylink Intellectual Property Llc Do Not Call list enforcement system and method
US8406410B2 (en) 2001-08-23 2013-03-26 At&T Intellectual Property I, L.P. On-demand call blocking service
US8488479B2 (en) 2008-12-19 2013-07-16 At&T Intellectual Property I, L.P. Method and apparatus for providing protection against spam
US8494144B2 (en) 2009-02-12 2013-07-23 Global Tel*Link Corporation System and method for controlled call handling
US8515034B2 (en) 2008-04-11 2013-08-20 Kenneth McFeeters Call interceptor
US20140177479A1 (en) * 2012-12-21 2014-06-26 Centurylink Intellectual Property Llc No Call List Deterrent

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7197120B2 (en) * 2000-12-22 2007-03-27 Openwave Systems Inc. Method and system for facilitating mediated communication
US20060036487A1 (en) * 2004-02-20 2006-02-16 Mann John N Process for telemarketing
US9253301B2 (en) * 2005-09-01 2016-02-02 Xtone Networks, Inc. System and method for announcing and routing incoming telephone calls using a distributed voice application execution system architecture
US8300798B1 (en) * 2006-04-03 2012-10-30 Wai Wu Intelligent communication routing system and method

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6519332B1 (en) 1998-11-13 2003-02-11 Ericsson Inc. Mechanism for rejecting collect calls
US6650742B1 (en) * 2000-05-19 2003-11-18 Bbnt Solutions Llc Systems and methods for reducing the occurrence of annoying voice calls
US20070201650A1 (en) * 2000-11-06 2007-08-30 Mastro Michael P System and method for providing an anti-marketing feature in a network
US8406410B2 (en) 2001-08-23 2013-03-26 At&T Intellectual Property I, L.P. On-demand call blocking service
US20040071281A1 (en) 2002-10-11 2004-04-15 Rashid Abid T. Telephony method, system and application for barring personal calls outside a local telephony system
US20050271196A1 (en) 2004-06-02 2005-12-08 Cynthia Florkey Network support for blocking calls based on calling party category
US20060093111A1 (en) * 2004-11-02 2006-05-04 Peck Michael C Method for charge-back on unwanted solicitations
US20060182029A1 (en) * 2005-02-15 2006-08-17 At&T Corp. Arrangement for managing voice over IP (VoIP) telephone calls, especially unsolicited or unwanted calls
US8005074B2 (en) 2006-05-19 2011-08-23 Nec Europe Ltd. Method for identifying undesired telephone calls
US8270588B2 (en) 2006-10-04 2012-09-18 Ronald Schwartz Method and system for incoming call management
US20100172482A1 (en) * 2006-10-18 2010-07-08 Keith Alan Fotta Automatic Reporting of Unwanted or Unlawful Telephonic Communication
US20080152111A1 (en) 2006-12-26 2008-06-26 Motorola, Inc. Handling of incoming calls
US8141133B2 (en) 2007-04-11 2012-03-20 International Business Machines Corporation Filtering communications between users of a shared network
US8515034B2 (en) 2008-04-11 2013-08-20 Kenneth McFeeters Call interceptor
US8488479B2 (en) 2008-12-19 2013-07-16 At&T Intellectual Property I, L.P. Method and apparatus for providing protection against spam
US20100183139A1 (en) 2009-01-16 2010-07-22 At&T Mobility Ii Llc Categorization and routing of calls based on genre
US8494144B2 (en) 2009-02-12 2013-07-23 Global Tel*Link Corporation System and method for controlled call handling
US8363803B2 (en) 2009-03-31 2013-01-29 Centurylink Intellectual Property Llc Do Not Call list enforcement system and method
US20140177479A1 (en) * 2012-12-21 2014-06-26 Centurylink Intellectual Property Llc No Call List Deterrent

Also Published As

Publication number Publication date
US20150103990A1 (en) 2015-04-16
US20170171388A1 (en) 2017-06-15
US9942395B2 (en) 2018-04-10
US20160028885A1 (en) 2016-01-28
US9571642B2 (en) 2017-02-14

Similar Documents

Publication Publication Date Title
US9942395B2 (en) Network-based social telephony firewall
US11297182B1 (en) Analysis of call metrics for call direction
US9100455B2 (en) Method and apparatus for providing protection against spam
US10135976B2 (en) Identifying and filtering incoming telephone calls to enhance privacy
US8379818B2 (en) Method and apparatus for conveying a calling party identifier
US8325900B2 (en) Telephone call classification utilizing a social network graph
US10270914B2 (en) Enhancing contact center calculations based on real-time speech analytics
US11790178B1 (en) Routing data communications between client-specific servers and data-center communications servers
US10992813B1 (en) Routing of calls based on analysis of digital voice data in a data-communications server system
US10944800B1 (en) Queuing data communications in a data communications network using a virtual assistant
US9554255B2 (en) System and method for providing USSD services using cross-operator number
US20150181023A1 (en) Method and system for intelligent call termination
CN110784442B (en) Efficient management of co-existing multi-channel interactions in a contact center
US11792300B1 (en) Managing communications-related data based on interactions between and aggregated data involving data-center communications server and client-specific circuitry
US20160309032A1 (en) Enhancing call experiences through personal rules
US11924381B1 (en) Interactive routing of data communications
US11700332B1 (en) Apparatuses and methods involving a contact center virtual agent
US11902470B1 (en) Apparatuses and methods involving parking communications
US10560577B2 (en) Efficient mechanism for customer feedback from a voice call
KR20150090643A (en) Apparatus and method for providing color ring back tone service

Legal Events

Date Code Title Description
AS Assignment

Owner name: AT&T INTELLECTUAL PROPERTY I, L.P., GEORGIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LEE, BRIAN;REEL/FRAME:031777/0133

Effective date: 20131016

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Expired due to failure to pay maintenance fee

Effective date: 20191006